Using Legitimate Services to Bypass Phishing Protections

Researchers at Abnormal Security have identified two techniques that attackers are using to bypass email security filters. The first tactic takes advantage of the fact that Microsoft Office 365 sends automated read receipts for emails that are deleted without being read.
Read More

Please follow and like us: